New EU security strategy aims to safeguard tech supply chains

The European Union (EU) has released a draft strategy aimed at protecting critical technology and mitigating risks associated with supply chain disruptions, industrial espionage, energy security issues, and infrastructure attacks. While the strategy does not explicitly mention China, it is widely seen as a response to potential threats posed by the country. European Commission’s commissioner for competition, Margrethe Vestager, acknowledged that China poses risks to Europe’s technology security and intellectual property.

The draft strategy categorizes four main risk areas: supply chains, critical infrastructure, technology security, and economic coercion. Supply chain risks encompass concerns such as price surges and the unavailability of critical components, including energy security. Critical infrastructure security includes undersea cables, oil and gas pipelines, and similar economic indicators. Technology security focuses on preventing advanced technologies, such as quantum computing, advanced semiconductors, and AI, from falling into the wrong hands. Economic coercion addresses the potential for external nations to exert influence and force policy changes based on a member state’s dependence on them.

To address these risks, the draft strategy emphasizes the promotion of European competitiveness, protection of economic security, and partnerships with other countries. The EU has already taken measures similar to the US CHIPS and Science Act, such as establishing the Chips Act, which aims to localize semiconductor production within the EU.

This recent announcement follows a similar move regarding 5G networking. The European Commission’s internal market commissioner, Thierry Breton, recently outlined strict restrictions on the use of equipment from “high-risk suppliers” in core and radio access network nodes, specifically mentioning Huawei and ZTE.

The Commission plans to propose a list of dual-use technologies for risk assessment, which could be adopted by the European Council, a part of the EU’s executive branch, by September 2023. This suggests that the final rules will likely be implemented next year.

Posted in

adm 2

Leave a Comment





 What is Computer Security Explained

 What is Computer Security Explained

 Know about the Benefits of Cloud Computing Service

 Know about the Benefits of Cloud Computing Service

How worker surveillance is backfiring on employers

How worker surveillance is backfiring on employers

 Know about Infrastructure as a service

 Know about Infrastructure as a service

history of cloud computing

 What is the history of cloud computing

why is Cloud Computing Important

Why is Cloud Computing Important

What is Cloud Computing How does it work

What is Cloud Computing How does it work

What is MHL How does it work

What is MHL How does it work

 Information technology vs. information management technology

 Information technology vs. information management technology

How to use Information technology for your business Explained

 How to use Information technology for your business Explained

10 amazing things about information technology

10 amazing things about information technology

What is Machine Learning Explained

 What is Machine Learning Explained

TikTok boat jumping challenge takes four lives

TikTok boat jumping challenge takes four lives

Kindle Unlimited in crisis: Amazon struggles with influx of AI-generated books

Kindle Unlimited in crisis: Amazon struggles with influx of AI-generated books

Instagram Threads is here to take Twitter’s throne

Instagram Threads is here to take Twitter’s throne

Eightify AI: Summarize YouTube videos instantly with artificial intelligence

Eightify AI: Summarize YouTube videos instantly with artificial intelligence

10,000 Microsoft employees affected by July 2023 layoffs

10,000 Microsoft employees affected by July 2023 layoffs

Industrial IoT (IIoT) Expanding its Use in Smart Factories Key Points for Applying Wireless Technology

Industrial IoT (IIoT) Expanding its Use in Smart Factories Key Points for Applying Wireless Technology

Empower Your Team and Live Up to Your Data Potential

Empower Your Team and Live Up to Your Data Potential

 A definitive guide to Information technology

 A definitive guide to Information technology

Know about the trends of Information Technology

Know about the trends of Information Technology

Is Information technology hard to learn

Is Information technology hard to learn

Information Management Technology

What is Information Management Technology Explained

9 facts about the information technology

9 facts about the information technology

 10 reasons to learn about Technology for your business

 10 reasons to learn about Technology for your business

 How is Technology helping businesses

 How is Technology helping businesses

Why is Information Technology Important Explained

Why is Information Technology Important Explained

A beginner’s guide to Information technology.

A beginner’s guide to Information technology.

What is Information Technology Explained

What is Information Technology Explained

Develop an IT Strategy to Support Customer Service

Develop an IT Strategy to Support Customer Service